TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

How To Use Portspoof (Cyber Deception)

BHIS · 2020-04-08 · Read original ↗

ATT&CK techniques detected

4 predictions
T1046Network Service Discovery
98%
“how to use portspoof ( cyber deception ) how to use portspoof ( cyber deception ) hello and welcome, and in this video, we ’ re going to be talking a little bit about portspoof, a fantastic utility that takes your unused tcp / ip ports and turns them into something different when…”
T1046Network Service Discovery
97%
“it says it ’ s an apache webserver or whatever. we can use those signatures, and to be honest, nmap uses those signatures to adequately identify what the remote application is on the other side. so now if we run an actual scan against it, we ’ re now going to do nmap space - af, …”
T1046Network Service Discovery
97%
“lot of noise for the attacker, but that ’ s kind of the point. remember, detection time plus reaction time must be less than the amount of time it takes for an attacker to successfully attack your network. so now we have greatly increased the amount of time it takes for an attack…”
T1046Network Service Discovery
96%
“to say, well about 70 % done, one ’ s completed and here are the results. now, if you look at this point, portspoof is now completely messed with us because it ’ s saying that port 1 is open, the service is telnet, and it believes that it ’ s a tanberg nps, 800 telnet d server. i…”

Summary

Hello and welcome, and in this video, we’re going to be talking a little bit about Portspoof, a fantastic utility that takes your unused TCP/IP ports and turns them into […]

The post How To Use Portspoof (Cyber Deception) appeared first on Black Hills Information Security, Inc..